메뉴 건너뛰기




Volumn 5, Issue 1, 2006, Pages 204-229

Elliptic curve cryptography over binary finite field GF(2m)

Author keywords

Cryptography; Data security; DH; ECC; ECDSA; ElGamal; IPsec; OpenSSL; RSA; Secure communication; TLS; Wireless

Indexed keywords

DH; ECC; ECDSA; ELGAMAL; IPSEC; OPENSSL; RSA; SECURE COMMUNICATION; TLS;

EID: 33644601461     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2006.204.229     Document Type: Article
Times cited : (13)

References (51)
  • 1
    • 33644608852 scopus 로고    scopus 로고
    • Data security and cryptographic techniques: A review
    • Rabah, K., 2004. Data security and cryptographic techniques: A review. ITJ., 3: 106-132.
    • (2004) ITJ. , vol.3 , pp. 106-132
    • Rabah, K.1
  • 3
    • 0003614758 scopus 로고
    • Digital signature and public-key functions as intractable as factorization
    • Rabin, M.O., 1979. Digital signature and public-key functions as intractable as factorization. MIT Laboratory of Computer Science, Technical Report, MIT/LCS/TR-212.
    • (1979) MIT Laboratory of Computer Science, Technical Report , vol.MIT-LCS-TR-212
    • Rabin, M.O.1
  • 4
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public key cryptosystems. Comm. ACM., 21: 120-126.
    • (1978) Comm. ACM. , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 6
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N., 1987. Elliptic curve cryptosystems. Mathematics of Computation, 48: 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 7
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Miller, V., 1986. Use of elliptic curves in cryptography. In: CRYPTO '85, pp: 417-426.
    • (1986) CRYPTO '85 , pp. 417-426
    • Miller, V.1
  • 8
    • 33644596644 scopus 로고    scopus 로고
    • Theory and implementation of elliptic curve cryptography
    • Rabah, K., 2005. Theory and implementation of elliptic curve cryptography. J. Applied Sci., 5: 604-633.
    • (2005) J. Applied Sci. , vol.5 , pp. 604-633
    • Rabah, K.1
  • 12
    • 33644603483 scopus 로고    scopus 로고
    • IEEE P1363a: http://grouper.ieee.org/groups/1363/P1363a/
  • 14
    • 33644591550 scopus 로고    scopus 로고
    • Implementation of elliptic curve diffie-hellman and EC encryption schemes
    • Rabah, K., 2005. Implementation of elliptic curve diffie-hellman and EC encryption schemes. ITJ., 4: 132-139.
    • (2005) ITJ. , vol.4 , pp. 132-139
    • Rabah, K.1
  • 18
    • 33644596307 scopus 로고    scopus 로고
    • ISO/IEC: http://grouper.ieee.org/groups/1363/Research/Other.html
  • 21
    • 84957657892 scopus 로고
    • Fast key exchange with elliptic curve systems
    • Advances in Cryptology-Crypto '95, Springer-Verlag
    • Schroeppel, R., H. Orman, S. O'Malley and O. Spatscheck, 1995. Fast Key Exchange with Elliptic Curve Systems. Advances in Cryptology-Crypto '95, LNCS 963, Springer-Verlag, pp: 43-56.
    • (1995) LNCS , vol.963 , pp. 43-56
    • Schroeppel, R.1    Orman, H.2    O'Malley, S.3    Spatscheck, O.4
  • 24
    • 0000010648 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Imai, H. and Y. Zheng, Eds., Berlin, Springer-Verlag
    • Lenstra, A. and E. Verheul, 2000. Selecting Cryptographic Key Sizes. In: Imai, H. and Y. Zheng, Eds., PKC 2000, volume LNCS 1751, Berlin, Springer-Verlag.
    • (2000) PKC 2000 , vol.LNCS 1751
    • Lenstra, A.1    Verheul, E.2
  • 25
    • 0001224411 scopus 로고    scopus 로고
    • Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
    • Bailey, D. and C. Paar, 2001. Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. J. Cryptol., Vol: 14.
    • (2001) J. Cryptol. , vol.14
    • Bailey, D.1    Paar, C.2
  • 26
    • 0004742708 scopus 로고    scopus 로고
    • Elliptic curve cryptography on smart cards without coprocessors
    • Bristol, UK, September 20th, Kluwer
    • Woodbury, A., D.V. Bailey and C. Paar, 2002. Elliptic Curve Cryptography on Smart Cards Without Coprocessors. In: CARDIS 2000, Bristol, UK, September 20th, Kluwer.
    • (2002) CARDIS 2000
    • Woodbury, A.1    Bailey, D.V.2    Paar, C.3
  • 27
    • 84955587760 scopus 로고
    • Non-supersingular elliptic curves for public key cryptosystems
    • Advances in Cryptology-Eurocrypt '91, Brighton, United Kingdom, Davies, D.W. (Ed.), Springer-Verlag
    • Beth, T. and F. Schaefer, 1991. Non-Supersingular Elliptic Curves for Public Key Cryptosystems. LNCS 547, Advances in Cryptology-Eurocrypt '91, Brighton, United Kingdom, Davies, D.W. (Ed.), Springer-Verlag, pp: 252-266.
    • (1991) LNCS , vol.547 , pp. 252-266
    • Beth, T.1    Schaefer, F.2
  • 29
    • 0006423786 scopus 로고    scopus 로고
    • Low Complexity Bit-parallel Finite Field Arithmetic Using Polynomial Basis
    • Koc, C. and C. Paar, Eds. Springer-Verlag
    • Wu, H., 1999. Low Complexity Bit-parallel Finite Field Arithmetic Using Polynomial Basis. In: Koc, C. and C. Paar, Eds., Workshop on Cryptographic Hardware and Embedded Systems (CHES '99), volume LNCS 1717. Springer-Verlag.
    • (1999) Workshop on Cryptographic Hardware and Embedded Systems (CHES '99) , vol.LNCS 1717
    • Wu, H.1
  • 30
    • 0033204715 scopus 로고    scopus 로고
    • Fast arithmetic for public-key algorithms in galois fields with composite exponents
    • Paar, C., P. Fleischmann and P. Soria-Rodriguez, 1999. Fast arithmetic for public-key algorithms in galois fields with composite exponents. IEEE Trans. Computers, 48: 1025-1034.
    • (1999) IEEE Trans. Computers , vol.48 , pp. 1025-1034
    • Paar, C.1    Fleischmann, P.2    Soria-Rodriguez, P.3
  • 31
    • 0033689021 scopus 로고    scopus 로고
    • m) and its applications in cryptographic systems
    • m) and its applications in cryptographic systems. Elect. Lett., 36: 1116-1117.
    • (2000) Elect. Lett. , vol.36 , pp. 1116-1117
    • Orlando, G.1    Paar, C.2
  • 34
    • 85009967725 scopus 로고
    • Constructing elliptic curves with given group order over large finite fields
    • Algorithmic Number Theory, The 1st Intl. Symposium, ANTS-I, Ithaca, Springer-Verlag
    • Georg-Johann, L. and Z. Horst-Günter, 1994. Constructing Elliptic Curves with given Group Order over Large Finite Fields. LNCS 877, Algorithmic Number Theory, The 1st Intl. Symposium, ANTS-I, Ithaca, Springer-Verlag, pp: 250-263.
    • (1994) LNCS , vol.877 , pp. 250-263
    • Georg-Johann, L.1    Horst-Günter, Z.2
  • 35
    • 33644604523 scopus 로고    scopus 로고
    • Research Manuscript, Hewlett-Packard Laboratories
    • m). Research Manuscript, Hewlett-Packard Laboratories.
    • (1998) m)
    • Seroussi, G.1
  • 36
    • 84968486049 scopus 로고
    • Primitive normal basis for finite fields
    • Lenstra, H.W.Jr. and R. Schoof, 1987. Primitive normal basis for finite fields. Math. Comput., 48: 217-231.
    • (1987) Math. Comput. , vol.48 , pp. 217-231
    • Lenstra Jr., H.W.1    Schoof, R.2
  • 42
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation (mod p)
    • Pollard, J.M., 1978. Monte Carlo methods for index computation (mod p). Math. Comput., 32: 918-924.
    • (1978) Math. Comput. , vol.32 , pp. 918-924
    • Pollard, J.M.1
  • 44
    • 84958601057 scopus 로고    scopus 로고
    • A key recovery attack on discrete log-based schemes using a prime order subgroup
    • Advances in Cryptology-Crypto '97
    • Lim, C. and P. Lee, 1997. A key recovery attack on discrete log-based schemes using a prime order subgroup. Advances in Cryptology-Crypto '97, Lecture Notes in Computer Science, 1294: 249-263.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 249-263
    • Lim, C.1    Lee, P.2
  • 45
    • 85029478766 scopus 로고
    • New public-key scheme based on elliptic curves over the Ring Zn
    • Advances in Cryptology-Crypto '91, Barbara, S. and J. Feigenbaum (Eds.), Springer-Verlag, California
    • Koyama, K., U.M. Maurer, T. Okamoto and S.A. Vanstone, 1992. New Public-key Scheme Based on Elliptic Curves over the Ring Zn. LNCS 576, Advances in Cryptology-Crypto '91, Barbara, S. and J. Feigenbaum (Eds.), Springer-Verlag, California, pp: 252-266.
    • (1992) LNCS , vol.576 , pp. 252-266
    • Koyama, K.1    Maurer, U.M.2    Okamoto, T.3    Vanstone, S.A.4
  • 46
    • 33644583862 scopus 로고    scopus 로고
    • ANSI key schemes FIPS 140-2. http://cio.doe.gov/Publications/profile2000/ Profile2000_AppendixA.htm
    • ANSI Key Schemes FIPS 140-2
  • 47
    • 85084380393 scopus 로고    scopus 로고
    • Representation of Elliptic Curve Digital Signature Algorithm (ECDSA) keys and signatures in internet X.509 public-key infrastructure certificates
    • Basham, L., D. Johnson and T. Polk, 1999. Representation of Elliptic Curve Digital Signature Algorithm (ECDSA) keys and signatures in internet X.509 public-key infrastructure certificates. Internet Draft, http://www.ietf.org, pp: 252-266.
    • (1999) Internet Draft , pp. 252-266
    • Basham, L.1    Johnson, D.2    Polk, T.3
  • 48
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T., 1985. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Infor. Theory, 31: 469-472.
    • (1985) IEEE Trans. Infor. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 51
    • 33644600874 scopus 로고
    • A parallel galois field multiplier with low complexity based on composite fields
    • Mölle, Sweden
    • Paar, C., 1993. A parallel galois field multiplier with low complexity based on composite fields. 6th Joint Swedish-Russian Workshop on Information Theory, Mölle, Sweden, pp: 320-324.
    • (1993) 6th Joint Swedish-Russian Workshop on Information Theory , pp. 320-324
    • Paar, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.